You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					1024 lines
				
				30 KiB
			
		
		
			
		
	
	
					1024 lines
				
				30 KiB
			| 
											2 years ago
										 | /** | ||
|  |  * Password-based encryption functions. | ||
|  |  * | ||
|  |  * @author Dave Longley | ||
|  |  * @author Stefan Siegl <stesie@brokenpipe.de> | ||
|  |  * | ||
|  |  * Copyright (c) 2010-2013 Digital Bazaar, Inc. | ||
|  |  * Copyright (c) 2012 Stefan Siegl <stesie@brokenpipe.de> | ||
|  |  * | ||
|  |  * An EncryptedPrivateKeyInfo: | ||
|  |  * | ||
|  |  * EncryptedPrivateKeyInfo ::= SEQUENCE { | ||
|  |  *   encryptionAlgorithm  EncryptionAlgorithmIdentifier, | ||
|  |  *   encryptedData        EncryptedData } | ||
|  |  * | ||
|  |  * EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier | ||
|  |  * | ||
|  |  * EncryptedData ::= OCTET STRING | ||
|  |  */ | ||
|  | var forge = require('./forge'); | ||
|  | require('./aes'); | ||
|  | require('./asn1'); | ||
|  | require('./des'); | ||
|  | require('./md'); | ||
|  | require('./oids'); | ||
|  | require('./pbkdf2'); | ||
|  | require('./pem'); | ||
|  | require('./random'); | ||
|  | require('./rc2'); | ||
|  | require('./rsa'); | ||
|  | require('./util'); | ||
|  | 
 | ||
|  | if(typeof BigInteger === 'undefined') { | ||
|  |   var BigInteger = forge.jsbn.BigInteger; | ||
|  | } | ||
|  | 
 | ||
|  | // shortcut for asn.1 API
 | ||
|  | var asn1 = forge.asn1; | ||
|  | 
 | ||
|  | /* Password-based encryption implementation. */ | ||
|  | var pki = forge.pki = forge.pki || {}; | ||
|  | module.exports = pki.pbe = forge.pbe = forge.pbe || {}; | ||
|  | var oids = pki.oids; | ||
|  | 
 | ||
|  | // validator for an EncryptedPrivateKeyInfo structure
 | ||
|  | // Note: Currently only works w/algorithm params
 | ||
|  | var encryptedPrivateKeyValidator = { | ||
|  |   name: 'EncryptedPrivateKeyInfo', | ||
|  |   tagClass: asn1.Class.UNIVERSAL, | ||
|  |   type: asn1.Type.SEQUENCE, | ||
|  |   constructed: true, | ||
|  |   value: [{ | ||
|  |     name: 'EncryptedPrivateKeyInfo.encryptionAlgorithm', | ||
|  |     tagClass: asn1.Class.UNIVERSAL, | ||
|  |     type: asn1.Type.SEQUENCE, | ||
|  |     constructed: true, | ||
|  |     value: [{ | ||
|  |       name: 'AlgorithmIdentifier.algorithm', | ||
|  |       tagClass: asn1.Class.UNIVERSAL, | ||
|  |       type: asn1.Type.OID, | ||
|  |       constructed: false, | ||
|  |       capture: 'encryptionOid' | ||
|  |     }, { | ||
|  |       name: 'AlgorithmIdentifier.parameters', | ||
|  |       tagClass: asn1.Class.UNIVERSAL, | ||
|  |       type: asn1.Type.SEQUENCE, | ||
|  |       constructed: true, | ||
|  |       captureAsn1: 'encryptionParams' | ||
|  |     }] | ||
|  |   }, { | ||
|  |     // encryptedData
 | ||
|  |     name: 'EncryptedPrivateKeyInfo.encryptedData', | ||
|  |     tagClass: asn1.Class.UNIVERSAL, | ||
|  |     type: asn1.Type.OCTETSTRING, | ||
|  |     constructed: false, | ||
|  |     capture: 'encryptedData' | ||
|  |   }] | ||
|  | }; | ||
|  | 
 | ||
|  | // validator for a PBES2Algorithms structure
 | ||
|  | // Note: Currently only works w/PBKDF2 + AES encryption schemes
 | ||
|  | var PBES2AlgorithmsValidator = { | ||
|  |   name: 'PBES2Algorithms', | ||
|  |   tagClass: asn1.Class.UNIVERSAL, | ||
|  |   type: asn1.Type.SEQUENCE, | ||
|  |   constructed: true, | ||
|  |   value: [{ | ||
|  |     name: 'PBES2Algorithms.keyDerivationFunc', | ||
|  |     tagClass: asn1.Class.UNIVERSAL, | ||
|  |     type: asn1.Type.SEQUENCE, | ||
|  |     constructed: true, | ||
|  |     value: [{ | ||
|  |       name: 'PBES2Algorithms.keyDerivationFunc.oid', | ||
|  |       tagClass: asn1.Class.UNIVERSAL, | ||
|  |       type: asn1.Type.OID, | ||
|  |       constructed: false, | ||
|  |       capture: 'kdfOid' | ||
|  |     }, { | ||
|  |       name: 'PBES2Algorithms.params', | ||
|  |       tagClass: asn1.Class.UNIVERSAL, | ||
|  |       type: asn1.Type.SEQUENCE, | ||
|  |       constructed: true, | ||
|  |       value: [{ | ||
|  |         name: 'PBES2Algorithms.params.salt', | ||
|  |         tagClass: asn1.Class.UNIVERSAL, | ||
|  |         type: asn1.Type.OCTETSTRING, | ||
|  |         constructed: false, | ||
|  |         capture: 'kdfSalt' | ||
|  |       }, { | ||
|  |         name: 'PBES2Algorithms.params.iterationCount', | ||
|  |         tagClass: asn1.Class.UNIVERSAL, | ||
|  |         type: asn1.Type.INTEGER, | ||
|  |         constructed: false, | ||
|  |         capture: 'kdfIterationCount' | ||
|  |       }, { | ||
|  |         name: 'PBES2Algorithms.params.keyLength', | ||
|  |         tagClass: asn1.Class.UNIVERSAL, | ||
|  |         type: asn1.Type.INTEGER, | ||
|  |         constructed: false, | ||
|  |         optional: true, | ||
|  |         capture: 'keyLength' | ||
|  |       }, { | ||
|  |         // prf
 | ||
|  |         name: 'PBES2Algorithms.params.prf', | ||
|  |         tagClass: asn1.Class.UNIVERSAL, | ||
|  |         type: asn1.Type.SEQUENCE, | ||
|  |         constructed: true, | ||
|  |         optional: true, | ||
|  |         value: [{ | ||
|  |           name: 'PBES2Algorithms.params.prf.algorithm', | ||
|  |           tagClass: asn1.Class.UNIVERSAL, | ||
|  |           type: asn1.Type.OID, | ||
|  |           constructed: false, | ||
|  |           capture: 'prfOid' | ||
|  |         }] | ||
|  |       }] | ||
|  |     }] | ||
|  |   }, { | ||
|  |     name: 'PBES2Algorithms.encryptionScheme', | ||
|  |     tagClass: asn1.Class.UNIVERSAL, | ||
|  |     type: asn1.Type.SEQUENCE, | ||
|  |     constructed: true, | ||
|  |     value: [{ | ||
|  |       name: 'PBES2Algorithms.encryptionScheme.oid', | ||
|  |       tagClass: asn1.Class.UNIVERSAL, | ||
|  |       type: asn1.Type.OID, | ||
|  |       constructed: false, | ||
|  |       capture: 'encOid' | ||
|  |     }, { | ||
|  |       name: 'PBES2Algorithms.encryptionScheme.iv', | ||
|  |       tagClass: asn1.Class.UNIVERSAL, | ||
|  |       type: asn1.Type.OCTETSTRING, | ||
|  |       constructed: false, | ||
|  |       capture: 'encIv' | ||
|  |     }] | ||
|  |   }] | ||
|  | }; | ||
|  | 
 | ||
|  | var pkcs12PbeParamsValidator = { | ||
|  |   name: 'pkcs-12PbeParams', | ||
|  |   tagClass: asn1.Class.UNIVERSAL, | ||
|  |   type: asn1.Type.SEQUENCE, | ||
|  |   constructed: true, | ||
|  |   value: [{ | ||
|  |     name: 'pkcs-12PbeParams.salt', | ||
|  |     tagClass: asn1.Class.UNIVERSAL, | ||
|  |     type: asn1.Type.OCTETSTRING, | ||
|  |     constructed: false, | ||
|  |     capture: 'salt' | ||
|  |   }, { | ||
|  |     name: 'pkcs-12PbeParams.iterations', | ||
|  |     tagClass: asn1.Class.UNIVERSAL, | ||
|  |     type: asn1.Type.INTEGER, | ||
|  |     constructed: false, | ||
|  |     capture: 'iterations' | ||
|  |   }] | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Encrypts a ASN.1 PrivateKeyInfo object, producing an EncryptedPrivateKeyInfo. | ||
|  |  * | ||
|  |  * PBES2Algorithms ALGORITHM-IDENTIFIER ::= | ||
|  |  *   { {PBES2-params IDENTIFIED BY id-PBES2}, ...} | ||
|  |  * | ||
|  |  * id-PBES2 OBJECT IDENTIFIER ::= {pkcs-5 13} | ||
|  |  * | ||
|  |  * PBES2-params ::= SEQUENCE { | ||
|  |  *   keyDerivationFunc AlgorithmIdentifier {{PBES2-KDFs}}, | ||
|  |  *   encryptionScheme AlgorithmIdentifier {{PBES2-Encs}} | ||
|  |  * } | ||
|  |  * | ||
|  |  * PBES2-KDFs ALGORITHM-IDENTIFIER ::= | ||
|  |  *   { {PBKDF2-params IDENTIFIED BY id-PBKDF2}, ... } | ||
|  |  * | ||
|  |  * PBES2-Encs ALGORITHM-IDENTIFIER ::= { ... } | ||
|  |  * | ||
|  |  * PBKDF2-params ::= SEQUENCE { | ||
|  |  *   salt CHOICE { | ||
|  |  *     specified OCTET STRING, | ||
|  |  *     otherSource AlgorithmIdentifier {{PBKDF2-SaltSources}} | ||
|  |  *   }, | ||
|  |  *   iterationCount INTEGER (1..MAX), | ||
|  |  *   keyLength INTEGER (1..MAX) OPTIONAL, | ||
|  |  *   prf AlgorithmIdentifier {{PBKDF2-PRFs}} DEFAULT algid-hmacWithSHA1 | ||
|  |  * } | ||
|  |  * | ||
|  |  * @param obj the ASN.1 PrivateKeyInfo object. | ||
|  |  * @param password the password to encrypt with. | ||
|  |  * @param options: | ||
|  |  *          algorithm the encryption algorithm to use | ||
|  |  *            ('aes128', 'aes192', 'aes256', '3des'), defaults to 'aes128'. | ||
|  |  *          count the iteration count to use. | ||
|  |  *          saltSize the salt size to use. | ||
|  |  *          prfAlgorithm the PRF message digest algorithm to use | ||
|  |  *            ('sha1', 'sha224', 'sha256', 'sha384', 'sha512') | ||
|  |  * | ||
|  |  * @return the ASN.1 EncryptedPrivateKeyInfo. | ||
|  |  */ | ||
|  | pki.encryptPrivateKeyInfo = function(obj, password, options) { | ||
|  |   // set default options
 | ||
|  |   options = options || {}; | ||
|  |   options.saltSize = options.saltSize || 8; | ||
|  |   options.count = options.count || 2048; | ||
|  |   options.algorithm = options.algorithm || 'aes128'; | ||
|  |   options.prfAlgorithm = options.prfAlgorithm || 'sha1'; | ||
|  | 
 | ||
|  |   // generate PBE params
 | ||
|  |   var salt = forge.random.getBytesSync(options.saltSize); | ||
|  |   var count = options.count; | ||
|  |   var countBytes = asn1.integerToDer(count); | ||
|  |   var dkLen; | ||
|  |   var encryptionAlgorithm; | ||
|  |   var encryptedData; | ||
|  |   if(options.algorithm.indexOf('aes') === 0 || options.algorithm === 'des') { | ||
|  |     // do PBES2
 | ||
|  |     var ivLen, encOid, cipherFn; | ||
|  |     switch(options.algorithm) { | ||
|  |     case 'aes128': | ||
|  |       dkLen = 16; | ||
|  |       ivLen = 16; | ||
|  |       encOid = oids['aes128-CBC']; | ||
|  |       cipherFn = forge.aes.createEncryptionCipher; | ||
|  |       break; | ||
|  |     case 'aes192': | ||
|  |       dkLen = 24; | ||
|  |       ivLen = 16; | ||
|  |       encOid = oids['aes192-CBC']; | ||
|  |       cipherFn = forge.aes.createEncryptionCipher; | ||
|  |       break; | ||
|  |     case 'aes256': | ||
|  |       dkLen = 32; | ||
|  |       ivLen = 16; | ||
|  |       encOid = oids['aes256-CBC']; | ||
|  |       cipherFn = forge.aes.createEncryptionCipher; | ||
|  |       break; | ||
|  |     case 'des': | ||
|  |       dkLen = 8; | ||
|  |       ivLen = 8; | ||
|  |       encOid = oids['desCBC']; | ||
|  |       cipherFn = forge.des.createEncryptionCipher; | ||
|  |       break; | ||
|  |     default: | ||
|  |       var error = new Error('Cannot encrypt private key. Unknown encryption algorithm.'); | ||
|  |       error.algorithm = options.algorithm; | ||
|  |       throw error; | ||
|  |     } | ||
|  | 
 | ||
|  |     // get PRF message digest
 | ||
|  |     var prfAlgorithm = 'hmacWith' + options.prfAlgorithm.toUpperCase(); | ||
|  |     var md = prfAlgorithmToMessageDigest(prfAlgorithm); | ||
|  | 
 | ||
|  |     // encrypt private key using pbe SHA-1 and AES/DES
 | ||
|  |     var dk = forge.pkcs5.pbkdf2(password, salt, count, dkLen, md); | ||
|  |     var iv = forge.random.getBytesSync(ivLen); | ||
|  |     var cipher = cipherFn(dk); | ||
|  |     cipher.start(iv); | ||
|  |     cipher.update(asn1.toDer(obj)); | ||
|  |     cipher.finish(); | ||
|  |     encryptedData = cipher.output.getBytes(); | ||
|  | 
 | ||
|  |     // get PBKDF2-params
 | ||
|  |     var params = createPbkdf2Params(salt, countBytes, dkLen, prfAlgorithm); | ||
|  | 
 | ||
|  |     encryptionAlgorithm = asn1.create( | ||
|  |       asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [ | ||
|  |       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false, | ||
|  |         asn1.oidToDer(oids['pkcs5PBES2']).getBytes()), | ||
|  |       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [ | ||
|  |         // keyDerivationFunc
 | ||
|  |         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [ | ||
|  |           asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false, | ||
|  |             asn1.oidToDer(oids['pkcs5PBKDF2']).getBytes()), | ||
|  |           // PBKDF2-params
 | ||
|  |           params | ||
|  |         ]), | ||
|  |         // encryptionScheme
 | ||
|  |         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [ | ||
|  |           asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false, | ||
|  |             asn1.oidToDer(encOid).getBytes()), | ||
|  |           // iv
 | ||
|  |           asn1.create( | ||
|  |             asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, iv) | ||
|  |         ]) | ||
|  |       ]) | ||
|  |     ]); | ||
|  |   } else if(options.algorithm === '3des') { | ||
|  |     // Do PKCS12 PBE
 | ||
|  |     dkLen = 24; | ||
|  | 
 | ||
|  |     var saltBytes = new forge.util.ByteBuffer(salt); | ||
|  |     var dk = pki.pbe.generatePkcs12Key(password, saltBytes, 1, count, dkLen); | ||
|  |     var iv = pki.pbe.generatePkcs12Key(password, saltBytes, 2, count, dkLen); | ||
|  |     var cipher = forge.des.createEncryptionCipher(dk); | ||
|  |     cipher.start(iv); | ||
|  |     cipher.update(asn1.toDer(obj)); | ||
|  |     cipher.finish(); | ||
|  |     encryptedData = cipher.output.getBytes(); | ||
|  | 
 | ||
|  |     encryptionAlgorithm = asn1.create( | ||
|  |       asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [ | ||
|  |       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false, | ||
|  |         asn1.oidToDer(oids['pbeWithSHAAnd3-KeyTripleDES-CBC']).getBytes()), | ||
|  |       // pkcs-12PbeParams
 | ||
|  |       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [ | ||
|  |         // salt
 | ||
|  |         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, salt), | ||
|  |         // iteration count
 | ||
|  |         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false, | ||
|  |           countBytes.getBytes()) | ||
|  |       ]) | ||
|  |     ]); | ||
|  |   } else { | ||
|  |     var error = new Error('Cannot encrypt private key. Unknown encryption algorithm.'); | ||
|  |     error.algorithm = options.algorithm; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   // EncryptedPrivateKeyInfo
 | ||
|  |   var rval = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [ | ||
|  |     // encryptionAlgorithm
 | ||
|  |     encryptionAlgorithm, | ||
|  |     // encryptedData
 | ||
|  |     asn1.create( | ||
|  |       asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, encryptedData) | ||
|  |   ]); | ||
|  |   return rval; | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Decrypts a ASN.1 PrivateKeyInfo object. | ||
|  |  * | ||
|  |  * @param obj the ASN.1 EncryptedPrivateKeyInfo object. | ||
|  |  * @param password the password to decrypt with. | ||
|  |  * | ||
|  |  * @return the ASN.1 PrivateKeyInfo on success, null on failure. | ||
|  |  */ | ||
|  | pki.decryptPrivateKeyInfo = function(obj, password) { | ||
|  |   var rval = null; | ||
|  | 
 | ||
|  |   // get PBE params
 | ||
|  |   var capture = {}; | ||
|  |   var errors = []; | ||
|  |   if(!asn1.validate(obj, encryptedPrivateKeyValidator, capture, errors)) { | ||
|  |     var error = new Error('Cannot read encrypted private key. ' + | ||
|  |       'ASN.1 object is not a supported EncryptedPrivateKeyInfo.'); | ||
|  |     error.errors = errors; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   // get cipher
 | ||
|  |   var oid = asn1.derToOid(capture.encryptionOid); | ||
|  |   var cipher = pki.pbe.getCipher(oid, capture.encryptionParams, password); | ||
|  | 
 | ||
|  |   // get encrypted data
 | ||
|  |   var encrypted = forge.util.createBuffer(capture.encryptedData); | ||
|  | 
 | ||
|  |   cipher.update(encrypted); | ||
|  |   if(cipher.finish()) { | ||
|  |     rval = asn1.fromDer(cipher.output); | ||
|  |   } | ||
|  | 
 | ||
|  |   return rval; | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Converts a EncryptedPrivateKeyInfo to PEM format. | ||
|  |  * | ||
|  |  * @param epki the EncryptedPrivateKeyInfo. | ||
|  |  * @param maxline the maximum characters per line, defaults to 64. | ||
|  |  * | ||
|  |  * @return the PEM-formatted encrypted private key. | ||
|  |  */ | ||
|  | pki.encryptedPrivateKeyToPem = function(epki, maxline) { | ||
|  |   // convert to DER, then PEM-encode
 | ||
|  |   var msg = { | ||
|  |     type: 'ENCRYPTED PRIVATE KEY', | ||
|  |     body: asn1.toDer(epki).getBytes() | ||
|  |   }; | ||
|  |   return forge.pem.encode(msg, {maxline: maxline}); | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Converts a PEM-encoded EncryptedPrivateKeyInfo to ASN.1 format. Decryption | ||
|  |  * is not performed. | ||
|  |  * | ||
|  |  * @param pem the EncryptedPrivateKeyInfo in PEM-format. | ||
|  |  * | ||
|  |  * @return the ASN.1 EncryptedPrivateKeyInfo. | ||
|  |  */ | ||
|  | pki.encryptedPrivateKeyFromPem = function(pem) { | ||
|  |   var msg = forge.pem.decode(pem)[0]; | ||
|  | 
 | ||
|  |   if(msg.type !== 'ENCRYPTED PRIVATE KEY') { | ||
|  |     var error = new Error('Could not convert encrypted private key from PEM; ' + | ||
|  |       'PEM header type is "ENCRYPTED PRIVATE KEY".'); | ||
|  |     error.headerType = msg.type; | ||
|  |     throw error; | ||
|  |   } | ||
|  |   if(msg.procType && msg.procType.type === 'ENCRYPTED') { | ||
|  |     throw new Error('Could not convert encrypted private key from PEM; ' + | ||
|  |       'PEM is encrypted.'); | ||
|  |   } | ||
|  | 
 | ||
|  |   // convert DER to ASN.1 object
 | ||
|  |   return asn1.fromDer(msg.body); | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Encrypts an RSA private key. By default, the key will be wrapped in | ||
|  |  * a PrivateKeyInfo and encrypted to produce a PKCS#8 EncryptedPrivateKeyInfo. | ||
|  |  * This is the standard, preferred way to encrypt a private key. | ||
|  |  * | ||
|  |  * To produce a non-standard PEM-encrypted private key that uses encapsulated | ||
|  |  * headers to indicate the encryption algorithm (old-style non-PKCS#8 OpenSSL | ||
|  |  * private key encryption), set the 'legacy' option to true. Note: Using this | ||
|  |  * option will cause the iteration count to be forced to 1. | ||
|  |  * | ||
|  |  * Note: The 'des' algorithm is supported, but it is not considered to be | ||
|  |  * secure because it only uses a single 56-bit key. If possible, it is highly | ||
|  |  * recommended that a different algorithm be used. | ||
|  |  * | ||
|  |  * @param rsaKey the RSA key to encrypt. | ||
|  |  * @param password the password to use. | ||
|  |  * @param options: | ||
|  |  *          algorithm: the encryption algorithm to use | ||
|  |  *            ('aes128', 'aes192', 'aes256', '3des', 'des'). | ||
|  |  *          count: the iteration count to use. | ||
|  |  *          saltSize: the salt size to use. | ||
|  |  *          legacy: output an old non-PKCS#8 PEM-encrypted+encapsulated | ||
|  |  *            headers (DEK-Info) private key. | ||
|  |  * | ||
|  |  * @return the PEM-encoded ASN.1 EncryptedPrivateKeyInfo. | ||
|  |  */ | ||
|  | pki.encryptRsaPrivateKey = function(rsaKey, password, options) { | ||
|  |   // standard PKCS#8
 | ||
|  |   options = options || {}; | ||
|  |   if(!options.legacy) { | ||
|  |     // encrypt PrivateKeyInfo
 | ||
|  |     var rval = pki.wrapRsaPrivateKey(pki.privateKeyToAsn1(rsaKey)); | ||
|  |     rval = pki.encryptPrivateKeyInfo(rval, password, options); | ||
|  |     return pki.encryptedPrivateKeyToPem(rval); | ||
|  |   } | ||
|  | 
 | ||
|  |   // legacy non-PKCS#8
 | ||
|  |   var algorithm; | ||
|  |   var iv; | ||
|  |   var dkLen; | ||
|  |   var cipherFn; | ||
|  |   switch(options.algorithm) { | ||
|  |   case 'aes128': | ||
|  |     algorithm = 'AES-128-CBC'; | ||
|  |     dkLen = 16; | ||
|  |     iv = forge.random.getBytesSync(16); | ||
|  |     cipherFn = forge.aes.createEncryptionCipher; | ||
|  |     break; | ||
|  |   case 'aes192': | ||
|  |     algorithm = 'AES-192-CBC'; | ||
|  |     dkLen = 24; | ||
|  |     iv = forge.random.getBytesSync(16); | ||
|  |     cipherFn = forge.aes.createEncryptionCipher; | ||
|  |     break; | ||
|  |   case 'aes256': | ||
|  |     algorithm = 'AES-256-CBC'; | ||
|  |     dkLen = 32; | ||
|  |     iv = forge.random.getBytesSync(16); | ||
|  |     cipherFn = forge.aes.createEncryptionCipher; | ||
|  |     break; | ||
|  |   case '3des': | ||
|  |     algorithm = 'DES-EDE3-CBC'; | ||
|  |     dkLen = 24; | ||
|  |     iv = forge.random.getBytesSync(8); | ||
|  |     cipherFn = forge.des.createEncryptionCipher; | ||
|  |     break; | ||
|  |   case 'des': | ||
|  |     algorithm = 'DES-CBC'; | ||
|  |     dkLen = 8; | ||
|  |     iv = forge.random.getBytesSync(8); | ||
|  |     cipherFn = forge.des.createEncryptionCipher; | ||
|  |     break; | ||
|  |   default: | ||
|  |     var error = new Error('Could not encrypt RSA private key; unsupported ' + | ||
|  |       'encryption algorithm "' + options.algorithm + '".'); | ||
|  |     error.algorithm = options.algorithm; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   // encrypt private key using OpenSSL legacy key derivation
 | ||
|  |   var dk = forge.pbe.opensslDeriveBytes(password, iv.substr(0, 8), dkLen); | ||
|  |   var cipher = cipherFn(dk); | ||
|  |   cipher.start(iv); | ||
|  |   cipher.update(asn1.toDer(pki.privateKeyToAsn1(rsaKey))); | ||
|  |   cipher.finish(); | ||
|  | 
 | ||
|  |   var msg = { | ||
|  |     type: 'RSA PRIVATE KEY', | ||
|  |     procType: { | ||
|  |       version: '4', | ||
|  |       type: 'ENCRYPTED' | ||
|  |     }, | ||
|  |     dekInfo: { | ||
|  |       algorithm: algorithm, | ||
|  |       parameters: forge.util.bytesToHex(iv).toUpperCase() | ||
|  |     }, | ||
|  |     body: cipher.output.getBytes() | ||
|  |   }; | ||
|  |   return forge.pem.encode(msg); | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Decrypts an RSA private key. | ||
|  |  * | ||
|  |  * @param pem the PEM-formatted EncryptedPrivateKeyInfo to decrypt. | ||
|  |  * @param password the password to use. | ||
|  |  * | ||
|  |  * @return the RSA key on success, null on failure. | ||
|  |  */ | ||
|  | pki.decryptRsaPrivateKey = function(pem, password) { | ||
|  |   var rval = null; | ||
|  | 
 | ||
|  |   var msg = forge.pem.decode(pem)[0]; | ||
|  | 
 | ||
|  |   if(msg.type !== 'ENCRYPTED PRIVATE KEY' && | ||
|  |     msg.type !== 'PRIVATE KEY' && | ||
|  |     msg.type !== 'RSA PRIVATE KEY') { | ||
|  |     var error = new Error('Could not convert private key from PEM; PEM header type ' + | ||
|  |       'is not "ENCRYPTED PRIVATE KEY", "PRIVATE KEY", or "RSA PRIVATE KEY".'); | ||
|  |     error.headerType = error; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   if(msg.procType && msg.procType.type === 'ENCRYPTED') { | ||
|  |     var dkLen; | ||
|  |     var cipherFn; | ||
|  |     switch(msg.dekInfo.algorithm) { | ||
|  |     case 'DES-CBC': | ||
|  |       dkLen = 8; | ||
|  |       cipherFn = forge.des.createDecryptionCipher; | ||
|  |       break; | ||
|  |     case 'DES-EDE3-CBC': | ||
|  |       dkLen = 24; | ||
|  |       cipherFn = forge.des.createDecryptionCipher; | ||
|  |       break; | ||
|  |     case 'AES-128-CBC': | ||
|  |       dkLen = 16; | ||
|  |       cipherFn = forge.aes.createDecryptionCipher; | ||
|  |       break; | ||
|  |     case 'AES-192-CBC': | ||
|  |       dkLen = 24; | ||
|  |       cipherFn = forge.aes.createDecryptionCipher; | ||
|  |       break; | ||
|  |     case 'AES-256-CBC': | ||
|  |       dkLen = 32; | ||
|  |       cipherFn = forge.aes.createDecryptionCipher; | ||
|  |       break; | ||
|  |     case 'RC2-40-CBC': | ||
|  |       dkLen = 5; | ||
|  |       cipherFn = function(key) { | ||
|  |         return forge.rc2.createDecryptionCipher(key, 40); | ||
|  |       }; | ||
|  |       break; | ||
|  |     case 'RC2-64-CBC': | ||
|  |       dkLen = 8; | ||
|  |       cipherFn = function(key) { | ||
|  |         return forge.rc2.createDecryptionCipher(key, 64); | ||
|  |       }; | ||
|  |       break; | ||
|  |     case 'RC2-128-CBC': | ||
|  |       dkLen = 16; | ||
|  |       cipherFn = function(key) { | ||
|  |         return forge.rc2.createDecryptionCipher(key, 128); | ||
|  |       }; | ||
|  |       break; | ||
|  |     default: | ||
|  |       var error = new Error('Could not decrypt private key; unsupported ' + | ||
|  |         'encryption algorithm "' + msg.dekInfo.algorithm + '".'); | ||
|  |       error.algorithm = msg.dekInfo.algorithm; | ||
|  |       throw error; | ||
|  |     } | ||
|  | 
 | ||
|  |     // use OpenSSL legacy key derivation
 | ||
|  |     var iv = forge.util.hexToBytes(msg.dekInfo.parameters); | ||
|  |     var dk = forge.pbe.opensslDeriveBytes(password, iv.substr(0, 8), dkLen); | ||
|  |     var cipher = cipherFn(dk); | ||
|  |     cipher.start(iv); | ||
|  |     cipher.update(forge.util.createBuffer(msg.body)); | ||
|  |     if(cipher.finish()) { | ||
|  |       rval = cipher.output.getBytes(); | ||
|  |     } else { | ||
|  |       return rval; | ||
|  |     } | ||
|  |   } else { | ||
|  |     rval = msg.body; | ||
|  |   } | ||
|  | 
 | ||
|  |   if(msg.type === 'ENCRYPTED PRIVATE KEY') { | ||
|  |     rval = pki.decryptPrivateKeyInfo(asn1.fromDer(rval), password); | ||
|  |   } else { | ||
|  |     // decryption already performed above
 | ||
|  |     rval = asn1.fromDer(rval); | ||
|  |   } | ||
|  | 
 | ||
|  |   if(rval !== null) { | ||
|  |     rval = pki.privateKeyFromAsn1(rval); | ||
|  |   } | ||
|  | 
 | ||
|  |   return rval; | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Derives a PKCS#12 key. | ||
|  |  * | ||
|  |  * @param password the password to derive the key material from, null or | ||
|  |  *          undefined for none. | ||
|  |  * @param salt the salt, as a ByteBuffer, to use. | ||
|  |  * @param id the PKCS#12 ID byte (1 = key material, 2 = IV, 3 = MAC). | ||
|  |  * @param iter the iteration count. | ||
|  |  * @param n the number of bytes to derive from the password. | ||
|  |  * @param md the message digest to use, defaults to SHA-1. | ||
|  |  * | ||
|  |  * @return a ByteBuffer with the bytes derived from the password. | ||
|  |  */ | ||
|  | pki.pbe.generatePkcs12Key = function(password, salt, id, iter, n, md) { | ||
|  |   var j, l; | ||
|  | 
 | ||
|  |   if(typeof md === 'undefined' || md === null) { | ||
|  |     if(!('sha1' in forge.md)) { | ||
|  |       throw new Error('"sha1" hash algorithm unavailable.'); | ||
|  |     } | ||
|  |     md = forge.md.sha1.create(); | ||
|  |   } | ||
|  | 
 | ||
|  |   var u = md.digestLength; | ||
|  |   var v = md.blockLength; | ||
|  |   var result = new forge.util.ByteBuffer(); | ||
|  | 
 | ||
|  |   /* Convert password to Unicode byte buffer + trailing 0-byte. */ | ||
|  |   var passBuf = new forge.util.ByteBuffer(); | ||
|  |   if(password !== null && password !== undefined) { | ||
|  |     for(l = 0; l < password.length; l++) { | ||
|  |       passBuf.putInt16(password.charCodeAt(l)); | ||
|  |     } | ||
|  |     passBuf.putInt16(0); | ||
|  |   } | ||
|  | 
 | ||
|  |   /* Length of salt and password in BYTES. */ | ||
|  |   var p = passBuf.length(); | ||
|  |   var s = salt.length(); | ||
|  | 
 | ||
|  |   /* 1. Construct a string, D (the "diversifier"), by concatenating | ||
|  |         v copies of ID. */ | ||
|  |   var D = new forge.util.ByteBuffer(); | ||
|  |   D.fillWithByte(id, v); | ||
|  | 
 | ||
|  |   /* 2. Concatenate copies of the salt together to create a string S of length | ||
|  |         v * ceil(s / v) bytes (the final copy of the salt may be trunacted | ||
|  |         to create S). | ||
|  |         Note that if the salt is the empty string, then so is S. */ | ||
|  |   var Slen = v * Math.ceil(s / v); | ||
|  |   var S = new forge.util.ByteBuffer(); | ||
|  |   for(l = 0; l < Slen; l++) { | ||
|  |     S.putByte(salt.at(l % s)); | ||
|  |   } | ||
|  | 
 | ||
|  |   /* 3. Concatenate copies of the password together to create a string P of | ||
|  |         length v * ceil(p / v) bytes (the final copy of the password may be | ||
|  |         truncated to create P). | ||
|  |         Note that if the password is the empty string, then so is P. */ | ||
|  |   var Plen = v * Math.ceil(p / v); | ||
|  |   var P = new forge.util.ByteBuffer(); | ||
|  |   for(l = 0; l < Plen; l++) { | ||
|  |     P.putByte(passBuf.at(l % p)); | ||
|  |   } | ||
|  | 
 | ||
|  |   /* 4. Set I=S||P to be the concatenation of S and P. */ | ||
|  |   var I = S; | ||
|  |   I.putBuffer(P); | ||
|  | 
 | ||
|  |   /* 5. Set c=ceil(n / u). */ | ||
|  |   var c = Math.ceil(n / u); | ||
|  | 
 | ||
|  |   /* 6. For i=1, 2, ..., c, do the following: */ | ||
|  |   for(var i = 1; i <= c; i++) { | ||
|  |     /* a) Set Ai=H^r(D||I). (l.e. the rth hash of D||I, H(H(H(...H(D||I)))) */ | ||
|  |     var buf = new forge.util.ByteBuffer(); | ||
|  |     buf.putBytes(D.bytes()); | ||
|  |     buf.putBytes(I.bytes()); | ||
|  |     for(var round = 0; round < iter; round++) { | ||
|  |       md.start(); | ||
|  |       md.update(buf.getBytes()); | ||
|  |       buf = md.digest(); | ||
|  |     } | ||
|  | 
 | ||
|  |     /* b) Concatenate copies of Ai to create a string B of length v bytes (the | ||
|  |           final copy of Ai may be truncated to create B). */ | ||
|  |     var B = new forge.util.ByteBuffer(); | ||
|  |     for(l = 0; l < v; l++) { | ||
|  |       B.putByte(buf.at(l % u)); | ||
|  |     } | ||
|  | 
 | ||
|  |     /* c) Treating I as a concatenation I0, I1, ..., Ik-1 of v-byte blocks, | ||
|  |           where k=ceil(s / v) + ceil(p / v), modify I by setting | ||
|  |           Ij=(Ij+B+1) mod 2v for each j.  */ | ||
|  |     var k = Math.ceil(s / v) + Math.ceil(p / v); | ||
|  |     var Inew = new forge.util.ByteBuffer(); | ||
|  |     for(j = 0; j < k; j++) { | ||
|  |       var chunk = new forge.util.ByteBuffer(I.getBytes(v)); | ||
|  |       var x = 0x1ff; | ||
|  |       for(l = B.length() - 1; l >= 0; l--) { | ||
|  |         x = x >> 8; | ||
|  |         x += B.at(l) + chunk.at(l); | ||
|  |         chunk.setAt(l, x & 0xff); | ||
|  |       } | ||
|  |       Inew.putBuffer(chunk); | ||
|  |     } | ||
|  |     I = Inew; | ||
|  | 
 | ||
|  |     /* Add Ai to A. */ | ||
|  |     result.putBuffer(buf); | ||
|  |   } | ||
|  | 
 | ||
|  |   result.truncate(result.length() - n); | ||
|  |   return result; | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Get new Forge cipher object instance. | ||
|  |  * | ||
|  |  * @param oid the OID (in string notation). | ||
|  |  * @param params the ASN.1 params object. | ||
|  |  * @param password the password to decrypt with. | ||
|  |  * | ||
|  |  * @return new cipher object instance. | ||
|  |  */ | ||
|  | pki.pbe.getCipher = function(oid, params, password) { | ||
|  |   switch(oid) { | ||
|  |   case pki.oids['pkcs5PBES2']: | ||
|  |     return pki.pbe.getCipherForPBES2(oid, params, password); | ||
|  | 
 | ||
|  |   case pki.oids['pbeWithSHAAnd3-KeyTripleDES-CBC']: | ||
|  |   case pki.oids['pbewithSHAAnd40BitRC2-CBC']: | ||
|  |     return pki.pbe.getCipherForPKCS12PBE(oid, params, password); | ||
|  | 
 | ||
|  |   default: | ||
|  |     var error = new Error('Cannot read encrypted PBE data block. Unsupported OID.'); | ||
|  |     error.oid = oid; | ||
|  |     error.supportedOids = [ | ||
|  |       'pkcs5PBES2', | ||
|  |       'pbeWithSHAAnd3-KeyTripleDES-CBC', | ||
|  |       'pbewithSHAAnd40BitRC2-CBC' | ||
|  |     ]; | ||
|  |     throw error; | ||
|  |   } | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Get new Forge cipher object instance according to PBES2 params block. | ||
|  |  * | ||
|  |  * The returned cipher instance is already started using the IV | ||
|  |  * from PBES2 parameter block. | ||
|  |  * | ||
|  |  * @param oid the PKCS#5 PBKDF2 OID (in string notation). | ||
|  |  * @param params the ASN.1 PBES2-params object. | ||
|  |  * @param password the password to decrypt with. | ||
|  |  * | ||
|  |  * @return new cipher object instance. | ||
|  |  */ | ||
|  | pki.pbe.getCipherForPBES2 = function(oid, params, password) { | ||
|  |   // get PBE params
 | ||
|  |   var capture = {}; | ||
|  |   var errors = []; | ||
|  |   if(!asn1.validate(params, PBES2AlgorithmsValidator, capture, errors)) { | ||
|  |     var error = new Error('Cannot read password-based-encryption algorithm ' + | ||
|  |       'parameters. ASN.1 object is not a supported EncryptedPrivateKeyInfo.'); | ||
|  |     error.errors = errors; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   // check oids
 | ||
|  |   oid = asn1.derToOid(capture.kdfOid); | ||
|  |   if(oid !== pki.oids['pkcs5PBKDF2']) { | ||
|  |     var error = new Error('Cannot read encrypted private key. ' + | ||
|  |       'Unsupported key derivation function OID.'); | ||
|  |     error.oid = oid; | ||
|  |     error.supportedOids = ['pkcs5PBKDF2']; | ||
|  |     throw error; | ||
|  |   } | ||
|  |   oid = asn1.derToOid(capture.encOid); | ||
|  |   if(oid !== pki.oids['aes128-CBC'] && | ||
|  |     oid !== pki.oids['aes192-CBC'] && | ||
|  |     oid !== pki.oids['aes256-CBC'] && | ||
|  |     oid !== pki.oids['des-EDE3-CBC'] && | ||
|  |     oid !== pki.oids['desCBC']) { | ||
|  |     var error = new Error('Cannot read encrypted private key. ' + | ||
|  |       'Unsupported encryption scheme OID.'); | ||
|  |     error.oid = oid; | ||
|  |     error.supportedOids = [ | ||
|  |       'aes128-CBC', 'aes192-CBC', 'aes256-CBC', 'des-EDE3-CBC', 'desCBC']; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   // set PBE params
 | ||
|  |   var salt = capture.kdfSalt; | ||
|  |   var count = forge.util.createBuffer(capture.kdfIterationCount); | ||
|  |   count = count.getInt(count.length() << 3); | ||
|  |   var dkLen; | ||
|  |   var cipherFn; | ||
|  |   switch(pki.oids[oid]) { | ||
|  |   case 'aes128-CBC': | ||
|  |     dkLen = 16; | ||
|  |     cipherFn = forge.aes.createDecryptionCipher; | ||
|  |     break; | ||
|  |   case 'aes192-CBC': | ||
|  |     dkLen = 24; | ||
|  |     cipherFn = forge.aes.createDecryptionCipher; | ||
|  |     break; | ||
|  |   case 'aes256-CBC': | ||
|  |     dkLen = 32; | ||
|  |     cipherFn = forge.aes.createDecryptionCipher; | ||
|  |     break; | ||
|  |   case 'des-EDE3-CBC': | ||
|  |     dkLen = 24; | ||
|  |     cipherFn = forge.des.createDecryptionCipher; | ||
|  |     break; | ||
|  |   case 'desCBC': | ||
|  |     dkLen = 8; | ||
|  |     cipherFn = forge.des.createDecryptionCipher; | ||
|  |     break; | ||
|  |   } | ||
|  | 
 | ||
|  |   // get PRF message digest
 | ||
|  |   var md = prfOidToMessageDigest(capture.prfOid); | ||
|  | 
 | ||
|  |   // decrypt private key using pbe with chosen PRF and AES/DES
 | ||
|  |   var dk = forge.pkcs5.pbkdf2(password, salt, count, dkLen, md); | ||
|  |   var iv = capture.encIv; | ||
|  |   var cipher = cipherFn(dk); | ||
|  |   cipher.start(iv); | ||
|  | 
 | ||
|  |   return cipher; | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Get new Forge cipher object instance for PKCS#12 PBE. | ||
|  |  * | ||
|  |  * The returned cipher instance is already started using the key & IV | ||
|  |  * derived from the provided password and PKCS#12 PBE salt. | ||
|  |  * | ||
|  |  * @param oid The PKCS#12 PBE OID (in string notation). | ||
|  |  * @param params The ASN.1 PKCS#12 PBE-params object. | ||
|  |  * @param password The password to decrypt with. | ||
|  |  * | ||
|  |  * @return the new cipher object instance. | ||
|  |  */ | ||
|  | pki.pbe.getCipherForPKCS12PBE = function(oid, params, password) { | ||
|  |   // get PBE params
 | ||
|  |   var capture = {}; | ||
|  |   var errors = []; | ||
|  |   if(!asn1.validate(params, pkcs12PbeParamsValidator, capture, errors)) { | ||
|  |     var error = new Error('Cannot read password-based-encryption algorithm ' + | ||
|  |       'parameters. ASN.1 object is not a supported EncryptedPrivateKeyInfo.'); | ||
|  |     error.errors = errors; | ||
|  |     throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   var salt = forge.util.createBuffer(capture.salt); | ||
|  |   var count = forge.util.createBuffer(capture.iterations); | ||
|  |   count = count.getInt(count.length() << 3); | ||
|  | 
 | ||
|  |   var dkLen, dIvLen, cipherFn; | ||
|  |   switch(oid) { | ||
|  |     case pki.oids['pbeWithSHAAnd3-KeyTripleDES-CBC']: | ||
|  |       dkLen = 24; | ||
|  |       dIvLen = 8; | ||
|  |       cipherFn = forge.des.startDecrypting; | ||
|  |       break; | ||
|  | 
 | ||
|  |     case pki.oids['pbewithSHAAnd40BitRC2-CBC']: | ||
|  |       dkLen = 5; | ||
|  |       dIvLen = 8; | ||
|  |       cipherFn = function(key, iv) { | ||
|  |         var cipher = forge.rc2.createDecryptionCipher(key, 40); | ||
|  |         cipher.start(iv, null); | ||
|  |         return cipher; | ||
|  |       }; | ||
|  |       break; | ||
|  | 
 | ||
|  |     default: | ||
|  |       var error = new Error('Cannot read PKCS #12 PBE data block. Unsupported OID.'); | ||
|  |       error.oid = oid; | ||
|  |       throw error; | ||
|  |   } | ||
|  | 
 | ||
|  |   // get PRF message digest
 | ||
|  |   var md = prfOidToMessageDigest(capture.prfOid); | ||
|  |   var key = pki.pbe.generatePkcs12Key(password, salt, 1, count, dkLen, md); | ||
|  |   md.start(); | ||
|  |   var iv = pki.pbe.generatePkcs12Key(password, salt, 2, count, dIvLen, md); | ||
|  | 
 | ||
|  |   return cipherFn(key, iv); | ||
|  | }; | ||
|  | 
 | ||
|  | /** | ||
|  |  * OpenSSL's legacy key derivation function. | ||
|  |  * | ||
|  |  * See: http://www.openssl.org/docs/crypto/EVP_BytesToKey.html
 | ||
|  |  * | ||
|  |  * @param password the password to derive the key from. | ||
|  |  * @param salt the salt to use, null for none. | ||
|  |  * @param dkLen the number of bytes needed for the derived key. | ||
|  |  * @param [options] the options to use: | ||
|  |  *          [md] an optional message digest object to use. | ||
|  |  */ | ||
|  | pki.pbe.opensslDeriveBytes = function(password, salt, dkLen, md) { | ||
|  |   if(typeof md === 'undefined' || md === null) { | ||
|  |     if(!('md5' in forge.md)) { | ||
|  |       throw new Error('"md5" hash algorithm unavailable.'); | ||
|  |     } | ||
|  |     md = forge.md.md5.create(); | ||
|  |   } | ||
|  |   if(salt === null) { | ||
|  |     salt = ''; | ||
|  |   } | ||
|  |   var digests = [hash(md, password + salt)]; | ||
|  |   for(var length = 16, i = 1; length < dkLen; ++i, length += 16) { | ||
|  |     digests.push(hash(md, digests[i - 1] + password + salt)); | ||
|  |   } | ||
|  |   return digests.join('').substr(0, dkLen); | ||
|  | }; | ||
|  | 
 | ||
|  | function hash(md, bytes) { | ||
|  |   return md.start().update(bytes).digest().getBytes(); | ||
|  | } | ||
|  | 
 | ||
|  | function prfOidToMessageDigest(prfOid) { | ||
|  |   // get PRF algorithm, default to SHA-1
 | ||
|  |   var prfAlgorithm; | ||
|  |   if(!prfOid) { | ||
|  |     prfAlgorithm = 'hmacWithSHA1'; | ||
|  |   } else { | ||
|  |     prfAlgorithm = pki.oids[asn1.derToOid(prfOid)]; | ||
|  |     if(!prfAlgorithm) { | ||
|  |       var error = new Error('Unsupported PRF OID.'); | ||
|  |       error.oid = prfOid; | ||
|  |       error.supported = [ | ||
|  |         'hmacWithSHA1', 'hmacWithSHA224', 'hmacWithSHA256', 'hmacWithSHA384', | ||
|  |         'hmacWithSHA512']; | ||
|  |       throw error; | ||
|  |     } | ||
|  |   } | ||
|  |   return prfAlgorithmToMessageDigest(prfAlgorithm); | ||
|  | } | ||
|  | 
 | ||
|  | function prfAlgorithmToMessageDigest(prfAlgorithm) { | ||
|  |   var factory = forge.md; | ||
|  |   switch(prfAlgorithm) { | ||
|  |   case 'hmacWithSHA224': | ||
|  |     factory = forge.md.sha512; | ||
|  |   case 'hmacWithSHA1': | ||
|  |   case 'hmacWithSHA256': | ||
|  |   case 'hmacWithSHA384': | ||
|  |   case 'hmacWithSHA512': | ||
|  |     prfAlgorithm = prfAlgorithm.substr(8).toLowerCase(); | ||
|  |     break; | ||
|  |   default: | ||
|  |     var error = new Error('Unsupported PRF algorithm.'); | ||
|  |     error.algorithm = prfAlgorithm; | ||
|  |     error.supported = [ | ||
|  |       'hmacWithSHA1', 'hmacWithSHA224', 'hmacWithSHA256', 'hmacWithSHA384', | ||
|  |       'hmacWithSHA512']; | ||
|  |     throw error; | ||
|  |   } | ||
|  |   if(!factory || !(prfAlgorithm in factory)) { | ||
|  |     throw new Error('Unknown hash algorithm: ' + prfAlgorithm); | ||
|  |   } | ||
|  |   return factory[prfAlgorithm].create(); | ||
|  | } | ||
|  | 
 | ||
|  | function createPbkdf2Params(salt, countBytes, dkLen, prfAlgorithm) { | ||
|  |   var params = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [ | ||
|  |     // salt
 | ||
|  |     asn1.create( | ||
|  |       asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, salt), | ||
|  |     // iteration count
 | ||
|  |     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false, | ||
|  |       countBytes.getBytes()) | ||
|  |   ]); | ||
|  |   // when PRF algorithm is not SHA-1 default, add key length and PRF algorithm
 | ||
|  |   if(prfAlgorithm !== 'hmacWithSHA1') { | ||
|  |     params.value.push( | ||
|  |       // key length
 | ||
|  |       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false, | ||
|  |         forge.util.hexToBytes(dkLen.toString(16))), | ||
|  |       // AlgorithmIdentifier
 | ||
|  |       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [ | ||
|  |         // algorithm
 | ||
|  |         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false, | ||
|  |           asn1.oidToDer(pki.oids[prfAlgorithm]).getBytes()), | ||
|  |         // parameters (null)
 | ||
|  |         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.NULL, false, '') | ||
|  |       ])); | ||
|  |   } | ||
|  |   return params; | ||
|  | } |